
Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024
In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.
Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024
In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.

Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023
Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective.
Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023
Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective.

Wei Fan, Weiqing Huang, Zhujun Zhang, Ye Wang, Degang Sun
2015 IEEE Trustcom/BigDataSE/ISPA 2015
This paper sets up an NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, and the results show a high protection level.
Wei Fan, Weiqing Huang, Zhujun Zhang, Ye Wang, Degang Sun
2015 IEEE Trustcom/BigDataSE/ISPA 2015
This paper sets up an NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, and the results show a high protection level.